diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc1728.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc1728.txt')
-rw-r--r-- | doc/rfc/rfc1728.txt | 339 |
1 files changed, 339 insertions, 0 deletions
diff --git a/doc/rfc/rfc1728.txt b/doc/rfc/rfc1728.txt new file mode 100644 index 0000000..e12ce6e --- /dev/null +++ b/doc/rfc/rfc1728.txt @@ -0,0 +1,339 @@ + + + + + + +Network Working Group C. Weider +Request for Comments: 1728 Bunyip Information Systems +Category: Informational December 1994 + + + Resource Transponders + +Status of this Memo + + This memo provides information for the Internet community. This memo + does not specify an Internet standard of any kind. Distribution of + this memo is unlimited. + +Abstract + + Although a number of systems have been created in the last several + years to provide resource location and navigation on the Internet, + the information contained in these systems must be maintained and + updated by hand. This paper describes an automatic mechanism, the + resource transponder, for maintaining resource location information. + +Author's Note: + + This document is being circulated as sort of a research paper; + consequently there are no protocol specifications or anything of the + sort. I hope that we can go from here and actually design them if + there's consensus that they are potentially useful. Once we have some + idea of the required functionality, we can then go out and + standardize them. + +Disclaimer + + This paper represents only the opinions of the author; it does not + represent the consensus of the IIIR Working Group, although it is + recognized by them as one legitimate approach to a solution of the + problem. + +1. Introduction + + In the past few years, we've seen the invention and growth of a + number of information location systems on the Internet, e.g., archie, + Gopher, and WAIS. However, as these systems have become widely + deployed, a number of maintenance and security problems have arisen + with them. Some of the major ones: + + 1) Out of necessity, most of these systems contain pointers to the + desired resources rather than the resources themselves. Therefore, + if a resource becomes obsolete, is modified, or is moved, the + + + +Weider [Page 1] + +RFC 1728 Resource Transponders December 1994 + + + location system must be updated by hand. Some systems (archie in + particular) proactively create updated indexes by contacting every + resource on a certain time schedule (every 30 days or so) but this + means that the system can be up to 30 days out of date, and this + process can be highly inefficient depending on the percentage of + information that has changed. + + 2) Conversely, anyone who maintains a resource that they wish indexed + must keep track of every directory which contains a pointer to + that resource, so that if it is modified, all the directories can + be updated. This obviously is an optimistic scenario. + + 3) Many organizations which have installed these systems do not have + the the available resources or expertise to maintain the + information in the systems. Thus we have long periods where the + information drifts, then a short period when the information is + updated again. + + 4) Even though these systems are almost always out of date today, + this problem will become increasingly harder for humans to manage + by hand as everyone on the net becomes their own publisher. Also, + as the net speeds up and people rely more and more on accurate + information, human-induced delays in updates of these systems will + become increasingly intolerable. + + 5) Most, if not all, of these systems provide no security whatsoever; + if a pointer to a resource appears in a locator system, then it is + assumed to be meant for public consumption. There are many + potential information providers who would like to use publicly + deployed information systems to publish to a very selected + clientele, and do not wish to allow the whole net access to their + resources. + +2. Requirements for a Solution + + There are several objectives which must be met by any proposed + solution to these problems: + + 1) We need to decrease the personnel resources needed for indexing + and pointer maintenance. + + 2) We need to increase the reliability and accuracy of the + information held in resource location systems. + + 3) We need to provide some mechanisms for security, particularly by + mediating access to the resources. + + + + + +Weider [Page 2] + +RFC 1728 Resource Transponders December 1994 + + + 4) We need to make it easy for non-experts, such as librarians, + archivists, and database maintainers, to announce their new + resources to the various resource location services. + + Many of these problems can be solved by a 'resource transponder' + mechanism. + +3. Resource Transponders + + The resource transponder system works by adding two new layers to + every resource: metainformation and an agent to update a resource + location system (RLS) with that metainformation. The metainformation + layer is physically attached to every resource, so that when the + resource is moved or altered, the metainformation is immediately + available to update the RLS. The agent layer may also be attached to + the resource or may not be; the implications of both of these options + are discussed in detail below. + + 3.1 Metainformation + + The metainformation layer of a given resource contains any + information which might be required to create a pointer to this + resource, and any information which may be useful for indicating how + to catalog or index the resource. For example, the metainformation + layer of a text document might contain such things as the Uniform + Resource Name (URN) of the document (this is sort of a ISBN number + for electronic resources), the title of the document, a Uniform + Resource Locator (URL) for the document (this is a combination net + address and access method indicator, used for retrieval), the size of + the document, etc. Thus the metainformation layer contains data about + the resource to which it is attached. + + This metainformation is expected to be modifiable. For example, the + metainformation layer may contain a history of where this particular + copy of a resource has been. Let's say that a resource/transponder + pair has been moved. When it gets to its new location, the agent can + then attempt to contact the resource at its old location to determine + whether the resource is still there (in which case the agent will + simply cause the new location to be added to the RLS) or whether the + resource is not there (in which case the agent can tell the RLS to + add the current pointer and delete the old one). + + A number of other possibilities for the contents of the + metainformation level are contained in section 4.1. + + + + + + + +Weider [Page 3] + +RFC 1728 Resource Transponders December 1994 + + +3.2 Agents + + The agent layer of a given resource contains an executable program + which is responsible for reading the metainformation attached to the + resource and using that information to update a RLS. It is also + responsible for updating the metainformation where necessary and for + running any indexing programs required by the RLS it is attempting to + update. + + When the tools required to build agents are constructed and deployed, + the author expects the agents to begin mediating access to the + resource, particularly for agents attached to resources which are not + currently considered active processes, such as text files and + digitized images. In this futuristic model, someone wishing to read + a given document would have to first negotiate access to the data + with the agent; the agent would then be responsible for delivering + the data to the client. However, it is expected that this type of + agent will not be widely deployed for some time. + + Different ways of implementing agents are discussed in section 4.2. + +4. Models for implementations of resource transponders + + 4.1. Models for implementations of the metainformation layer + + The metainformation layer can be impelemented in a number of ways, + depending on the resource with which it is associated. For an + 'active' resource, such as an on-line catalog or a mail-based + service, the metainformation can be stored in a file with a well- + known name in the software distribution. Alternatively, the + metainformation could be stored as a record in the data which the + resource serves. For a text document, the metainformation could be + stored as the first or last N bytes of the document (which would + break a number of editors and file display techniques, but would + guarantee that the metainformation is moved with the resource), or + perhaps as a file with a logically associated name (paper2.meta + associated with paper2.txt, for example). The problem with this + second approach is that the user must know that they have to move the + metainformation with the file itself, or things will start breaking. + If an agent is explicitly attached to the resource, the agent could + contain the metainformation internally. + + In any case, the resource transponder system must be able to + guarantee that the metainformation is moved when the resource is + moved. + + + + + + +Weider [Page 4] + +RFC 1728 Resource Transponders December 1994 + + +4.2 Models for implementations of the agents + + The agent layer can also be implemented in a number of ways, + depending on such things as system loads, desired sizes of resources, + multitasking capabilities, etc. + + The easiest and for many unitasking systems the cleanest way of + implementing an agent is to have one agent per computer. Then when a + resource is moved onto that computer, the agent is explicitly + activated and notified where the new resource is. For example, let's + say that someone wishes to download a copy of a resource and then let + the RLS know that that resource is available for public consumption. + She would download the resource and then run the agent, which would + then notify the RLS and update the metainformation attached to the + resource. This model could also be used to track files on a LAN, or + to provide local location services with no need to run a larger RLS. + + Another model for implementation of the agent is to have one agent + per resource. In this model, the agent would be moved along with the + resource and the metainformation. The agent could be implemented in a + file which would be associated with the resource; in that case the + agent would have to be explicitly activated when the resource was + moved. Alternatively, the agent/metainformation/resource system could + be implemented as one system, or in one file. In this case, the agent + itself would always be active, and would be responsible for mediating + access to the resource. When one did a 'telnet' to a resource with + an active agent, the agent would accept the telnet connection and be + responsible for providing security and translation for the data. This + could provide great security for resources while still allowing + pointers to them to be placed in public RLS's; the data in the + resource could be encrypted, with the agent responsible for + decrypting it. + +5. Security Considerations + + Security issues are discussed throughout this memo. + +6. Author's Address + + Chris Weider + Bunyip Information Systems, Inc. + 2001 S. Huron Parkway, #12 + Ann Arbor, MI 48104 + USA + + Phone: +1 313-971-2223 + Fax: +1 313-971-2223 + EMail: clw@bunyip.com + + + +Weider [Page 5] + +RFC 1728 Resource Transponders December 1994 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Weider [Page 6] + |